CAPsMAN "fun"
Posted: Tue Jun 26, 2018 4:46 pm
Hi there,
I have a little interesting issue with CAPsMAN. Well, let's say it works but it does not work....
Area:
Heavy AP concentration of mobile 2.4GHz APs. So 2.4 is not really favoured. Very few AC capable APs, thus spectrum is fairly open. Main boardroom is 20x6 meters and can host around 25 people at the same time.
Kit:
1. RB3011 as edge and CAPsMAN controller
2. PowerBox (RB960PGS-PB) as in-ceiling splitter to four APs
3. Four APs (RbcAPGi-5acD2nD), roughly 20m apart
Base Config:
1. Three SSIDs per freq band (both on 2.4 and 5.8GHz)
2. Full roaming on all APs required
3. Only WPA2-PSK with aes ccm encryption
4. Wireless key per SSID is complex passwords containing all kinds of characters
5. RB3011 to firewall between the SSIDs as they are on separate VLANs and need to get out to the internet
What I tried:
1. Normal CAPsMAN setup (keep it stupid, simple)
2. Added WPA PSK to the current WPA2-PSK setup
3. Added tkip encryption to the already setup aes ccm encryption
4. Set a Group-key Update value of 30mins
5. Created a datapath on a bridge per SSID, each bridge participates in its own VLAN. Local forwarding and client2client forwarding disabled implicitly
6. Four channels created one for 2.4 and the rest on 5.8. Initially the TX power on the 2.4GHz was set very low to force devices to rather connect at 5.8 GHz. Band on 2.4GHz was set to g/n only and extension channel implicitly disabled. On the 5.8 channels the band was set to n/ac, TX power fair for indoor use and eC extension channel used.
**During my troubleshooting I now enabled all bands on 2.4 (b/g/n) and 5.8 (a/n/ac)
7. Six configurations created, one pair per SSID. This allows to TX the same SSID on both 2.4GHz and 5.8GHz.
**Every CAPs config has a name, mode set to AP, SSID, distance set to dynamic, hw retries set to 15, hw protection mode set to rts/cts, disconnect timeout set to 15sec, keepalive frames are enabled, country set to south africa, max station count set to 30 (this is 30 devices per ap right?), multicast helper to full (found that some devices likes this more), enabled HT TX/RX Chains 0 and 1 with a HT guard level of any.
**channel config mentioned in point 6 above
**no data rates set, some devices (most on 2.4 only does not like if any data rate is configured)
**Datapath set as above
**and Security as well.
8. CAPs Provisioning is not used
9. Static CAP interfaces were created, one per SSID, AP and frequency. One SSID is configured on the main interface using the same MAC address as the designated AP with two slave devices for the remaining SSIDs. Unique MAC IDs were created per SSID. ****This is exactly how the provisioning service will configure it anyway.
10. Upgraded all devices to the latest ROS 3.17 (6.42.4 - hehe) with the latest firmware
Problems experienced:
1. Some client devices (mobile devices or laptops) simply goes into a connect/disconnect loop. Some devices shows (Obtaining IP address) and then simply does not connect. Others connects, gets IPs but then drops at a random interval
2. Many devices experience the infamous 4-way handshake nightmare
3. Some devices connects to the 2.4, then disconnects and connect to 5.8, get an IP issued by the DHCP server, but cannot access anything (towards the internet of course)
4. Many devices connects and disconnects for no reason.
5. Some device links perfectly, can VPN out to the internet and browse with no issues at all.
****I say SOME DEVICES as the problems do follow the device, but it is not manufacturer dependant. This is what stumps me. If it was iPhones I would say it is the aes ccm tkip combo. If it was Android devices it may be noise due to the 2.4GHz saturation. If it was HP laptops we could say it is the colour of the rainbow
6. Some devices simply sends a deauth: unspecified to the AP
Apologies for the essay, but I will go bald soon...
I have a little interesting issue with CAPsMAN. Well, let's say it works but it does not work....
Area:
Heavy AP concentration of mobile 2.4GHz APs. So 2.4 is not really favoured. Very few AC capable APs, thus spectrum is fairly open. Main boardroom is 20x6 meters and can host around 25 people at the same time.
Kit:
1. RB3011 as edge and CAPsMAN controller
2. PowerBox (RB960PGS-PB) as in-ceiling splitter to four APs
3. Four APs (RbcAPGi-5acD2nD), roughly 20m apart
Base Config:
1. Three SSIDs per freq band (both on 2.4 and 5.8GHz)
2. Full roaming on all APs required
3. Only WPA2-PSK with aes ccm encryption
4. Wireless key per SSID is complex passwords containing all kinds of characters
5. RB3011 to firewall between the SSIDs as they are on separate VLANs and need to get out to the internet
What I tried:
1. Normal CAPsMAN setup (keep it stupid, simple)
2. Added WPA PSK to the current WPA2-PSK setup
3. Added tkip encryption to the already setup aes ccm encryption
4. Set a Group-key Update value of 30mins
5. Created a datapath on a bridge per SSID, each bridge participates in its own VLAN. Local forwarding and client2client forwarding disabled implicitly
6. Four channels created one for 2.4 and the rest on 5.8. Initially the TX power on the 2.4GHz was set very low to force devices to rather connect at 5.8 GHz. Band on 2.4GHz was set to g/n only and extension channel implicitly disabled. On the 5.8 channels the band was set to n/ac, TX power fair for indoor use and eC extension channel used.
**During my troubleshooting I now enabled all bands on 2.4 (b/g/n) and 5.8 (a/n/ac)
7. Six configurations created, one pair per SSID. This allows to TX the same SSID on both 2.4GHz and 5.8GHz.
**Every CAPs config has a name, mode set to AP, SSID, distance set to dynamic, hw retries set to 15, hw protection mode set to rts/cts, disconnect timeout set to 15sec, keepalive frames are enabled, country set to south africa, max station count set to 30 (this is 30 devices per ap right?), multicast helper to full (found that some devices likes this more), enabled HT TX/RX Chains 0 and 1 with a HT guard level of any.
**channel config mentioned in point 6 above
**no data rates set, some devices (most on 2.4 only does not like if any data rate is configured)
**Datapath set as above
**and Security as well.
8. CAPs Provisioning is not used
9. Static CAP interfaces were created, one per SSID, AP and frequency. One SSID is configured on the main interface using the same MAC address as the designated AP with two slave devices for the remaining SSIDs. Unique MAC IDs were created per SSID. ****This is exactly how the provisioning service will configure it anyway.
10. Upgraded all devices to the latest ROS 3.17 (6.42.4 - hehe) with the latest firmware
Problems experienced:
1. Some client devices (mobile devices or laptops) simply goes into a connect/disconnect loop. Some devices shows (Obtaining IP address) and then simply does not connect. Others connects, gets IPs but then drops at a random interval
2. Many devices experience the infamous 4-way handshake nightmare
3. Some devices connects to the 2.4, then disconnects and connect to 5.8, get an IP issued by the DHCP server, but cannot access anything (towards the internet of course)
4. Many devices connects and disconnects for no reason.
5. Some device links perfectly, can VPN out to the internet and browse with no issues at all.
****I say SOME DEVICES as the problems do follow the device, but it is not manufacturer dependant. This is what stumps me. If it was iPhones I would say it is the aes ccm tkip combo. If it was Android devices it may be noise due to the 2.4GHz saturation. If it was HP laptops we could say it is the colour of the rainbow
6. Some devices simply sends a deauth: unspecified to the AP
Apologies for the essay, but I will go bald soon...